SeeTwo (THM)
Can you see who is in command and control?
Intro.
Start
searching.











What is the first file that is read? Enter the full path of the file.

What is the output of the file from question 1?

What is the user that the attacker created as a backdoor? Enter the entire line that indicates the user.

What is the name of the backdoor executable?

What is the md5 hash value of the executable from question 4?

What was the first cronjob that was placed by the attacker?

What is the flag?


final thoughts.
Last updated